Cyber Essentials

"Around 80% of cyber attacks could be prevented if businesses put simple security controls in place”

Cyber Security Boost for UK Firms Press Release by (16 January 2016)


What is Cyber Essentials?

Many common cyber attacks succeed because simple technical controls are not managed correctly. The UK Government has introduced the industry supported Cyber Essentials scheme to help businesses put these controls in place and help defend against common internet-borne threats.

Who is it for?

Cyber Essentials is applicable to all organisations, of all sizes, in all industries. This is not limited to companies in the private sector - it also applies to universities, charities, public sector and not-for-profit organisations.

How can it help?

Implementing the measures recommended by the Cyber Essentials scheme can significantly reduce some of the common risks that your business faces and it provides a good foundation of basic cyber security.

What is the Cyber Essentials Certificate?

Once you have got the recommended Cyber Essentials controls in place, you have the option of being assessed against the scheme. If successful, you can then use the Cyber Essentials badge to publicize that you have met a Government approved cyber security standard. This gives customers and suppliers confidence that you are taking cyber security seriously.

Being Cyber Essentials certified is optional for most businesses and organisations, but it’s worth noting that the UK Government requires all suppliers bidding for certain contracts to have the certification.

Is implementing Cyber Essentials enough?

Cyber Essentials has been designed as a foundation of cyber security best practice, to protect from some of the most common internet-borne threats. Implementing the scheme can significantly reduce your vulnerability, however it does not offer a silver bullet to remove all cyber security risk.

It is not designed to address more advanced, targeted attacks, so organisations facing these threats will need to implement additional measures as part of their security strategy.

Whether you need certification by the scheme or not is your business decision. It’s also important that you think about your own organisation and risk to determine what additional security measures to put into place.


More information about the Cyber Essentials Scheme can be found in the Government’s Summary document.


What else can I do to stay protected?

If you need a higher level of security, or you need to comply with other industry standards, our pro tools can help.

Hackers exploit weaknesses you didn’t even know you have. Secure configurations are essential, but identifying, monitoring and prioritising security vulnerabilities and policy compliance can be a difficult and time-consuming process.

Our software helps you find security gaps in your IT networks and infrastructure before hackers do:

Nipper Studio

Nipper Studio is one of the most advanced and detailed configuration auditing tools in the world. It produces reports which help harden and secure essential network devices such as Firewalls, Switches and Routers.

Within seconds, Nipper produces a detailed analysis of your device’s vulnerabilities and pulls this into an easy to understand, confidential report telling you exactly where the weak spots are and how to fix them.

Try it free now!

Paws Studio

Paws Studio audits end point devices, such as workstations and servers, against industry standard compliance policies and/or your internal IT security policies. It provides an easy to understand report with a pass/fail rating so you can quickly assess and improve your compliance status.

This helps you stay compliant, establish a security baseline and avoid costly fines, risks and security breaches.

Try it free now!

Perfect for either one-off auditing or continuous monitoring of your network, our tools can be downloaded, installed and up and running within minutes. There’s no limit to the amount of times you can audit a device and our licensing model and per device pricing means that your license can grow with you.

  • Identify exploitable vulnerabilities you might otherwise miss
  • Harden your network infrastructure
  • Become compliant with industry standards
  • Produce comprehensive reports in seconds

Take a free trial and try our tools today.